CVE-2016-10960

The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:joomlaserviceprovider:wsecure:*:*:*:*:lite:wordpress:*:*

History

21 Nov 2024, 02:45

Type Values Removed Values Added
References () https://wordpress.org/plugins/wsecure/#developers - Release Notes () https://wordpress.org/plugins/wsecure/#developers - Release Notes
References () https://www.pluginvulnerabilities.com/2016/07/12/remote-code-execution-rce-vulnerability-in-wsecure-lite/ - Exploit, Third Party Advisory () https://www.pluginvulnerabilities.com/2016/07/12/remote-code-execution-rce-vulnerability-in-wsecure-lite/ - Exploit, Third Party Advisory

Information

Published : 2019-09-16 13:15

Updated : 2024-11-21 02:45


NVD link : CVE-2016-10960

Mitre link : CVE-2016-10960

CVE.ORG link : CVE-2016-10960


JSON object : View

Products Affected

joomlaserviceprovider

  • wsecure
CWE
CWE-20

Improper Input Validation